1. Hacker HighSchool

    Author: Myanmar Ebook Store Genre: »
    Rating


    Lesson 1: Being a Hacker
    1.0 Introduction
    1.1 Resources
    1.1.1 Books
    1.1.2 Magazines and Newspapers
    1.1.3 Zines and Blogs
    1.1.4 Forums and Mailing Lists
    1.1.5 Newsgroups
    1.1.6 Websites
    1.1.7 Chat
    1.1.8 P2P
    1.2 Further Lessons

    Lesson 2: Basic Commands in Linux and Windows
    2.1. Introduction and Objectives
    2.2. Requirements and Setup
    2.2.1 Requirements
    2.2.2 Setup
    2.3. System Operation: WINDOWS
    2.3.1 How to open an MS-DOS window
    2.3.2 Commands and tools (Windows)
    2.4. System Operations: Linux
    2.4.1 How to open a console window
    2.4.2 Commands and tools (Linux)

    Lesson 3: Ports and Protocols
    3.1 Introduction
    3.2 Basic concepts of networks
    3.2.1 Devices
    3.2.2 Topologies
    3.3 TCP/IP model
    3.3.1 Introduction
    3.3.2 Layers
    3.3.2.1 Application
    3.3.2.2 Transport
    3.3.2.3 Internet
    3.3.2.4 Network Access
    3.3.3 Protocols
    3.3.3.1 Application layer protocols
    3.3.3.2 Transport layer Protocols
    3.3.3.3 Internet layer Protocols
    3.3.4 IP Addresses
    3.3.5 Ports

    Lesson 4: Services and Connections
    4.0 Introduction
    4.1 Services
    4.1.1 HTTP and The Web
    4.1.2 E-Mail – POP and SMTP
    4.1.3 IRC
    4.1.4 FTP
    4.1.5 Telnet and SSH
    4.1.6 DNS
    4.1.7 DHCP
    4.2 Connections
    4.2.1 ISPs
    4.2.2 Plain Old Telephone Service
    4.2.3 DSL
    4.2.4 Cable Modems

    Lesson 5: System Identification
    5.0 Introduction
    5.1 Identifying a Server
    5.1.1 Identifying the Owner of a domain
    5.1.2 Identifying the IP address of a domain
    5.2 Identifying Services
    5.2.1 Ping and TraceRoute
    5.2.2 Banner Grabbing
    5.2.3 Identifying Services from Ports and Protocols
    5.3 System Fingerprinting
    5.3.1 Scanning Remote Computers

    Lesson 6: Malware
    6.0 Introduction
    6.1 Viruses (Virii)
    6.1.1 Introduction
    6.1.2 Description
    6.1.2.1 Boot Sector Viruses
    6.1.2.2 The Executable File Virus
    6.1.2.3 The Terminate and Stay Resident (TSR) Virus
    6.1.2.4 The Polymorphic Virus
    6.1.2.5 The Macro Virus
    6.2 Worms
    6.2.1 Introduction
    6.2.2 Description
    6.3 Trojans and Spyware
    6.3.1 Introduction
    6.3.2 Description
    6.4 Rootkits and Backdoors
    6.4.1 Introduction
    6.4.2 Description
    6.5 Logicbombs and Timebombs
    6.5.1 Introduction
    6.5.2 Description
    6.6 Countermeasures
    6.6.1 Introduction
    6.6.2 Anti-Virus
    6.6.3 NIDS
    6.6.4 HIDS
    6.6.5 Firewalls
    6.6.6 Sandboxes
    6.7 Good Safety Advice

    Lesson 7: Attack Analysis
    7.0 Introduction
    7.1 Netstat and Host Application Firewalls
    7.1.1 Netstat
    7.1.2 Firewalls
    7.2 Packet Sniffers
    7.2.1 Sniffing
    7.2.2 Decoding Network Traffic
    7.2.3 Sniffing Other Computers
    7.2.4 Intrusion Detection Systems
    7.3 Honeypots and Honeynets
    7.3.1 Types of Honeypots
    7.3.2 Building a Honeypot

    Lesson 8: Digital Forensics
    8.0 Introduction
    8.1 Forensic Principals
    8.1.0 Introduction
    8.1.1 Avoid Contaminiation
    8.1.2 Act Methodically
    8.1.3 Chain of Evidence
    8.1.4 Conclusion
    8.2 Stand-alone Forensics
    8.2.0 Introduction
    8.2.1 Hard Drive and Storage Media Basics
    8.2.2 Encryption, Decryption and File Formats
    8.2.3 Finding a Needle in a Haystack
    8.2.3.1 find
    8.2.3.2 grep
    8.2.3.3 strings
    8.2.3.4 awk
    8.2.3.5 The Pipe “|”
    8.2.4 Making use of other sources
    8.3 Network Forensics
    8.3.0 Introduction
    8.3.1 Firewall Logs

    Lesson 9: Email Security
    9.0 Introduction
    9.1 How E-mail Works
    9.1.1 E-mail Accounts
    9.1.2 POP and SMTP
    9.1.3 Web Mail
    9.2 Safe E-mail Usage Part 1: Receiving
    9.2.1 Spam, Phishing and Fraud
    9.2.2 HTML E-Mail
    9.2.3 Attachment Security
    9.2.4 Forged headers
    9.3 Safe E-mail Usage Part 2: Sending
    9.3.1 Digital Certificates
    9.3.2 Digital Signatures
    9.3.3 Getting a certificate
    9.3.4 Encryption
    9.3.5 How does it work?
    9.3.6 Decryption
    9.3.7 Is Encryption Unbreakable?
    9.4 Connection Security

    Lesson 10: Web Security
    10.1 Fundamentals of Web Security
    10.1.1 How the web really works
    10.1.2 Rattling the Locks
    10.1.3 Looking through Tinted Windows - SSL
    10.1.4 Having someone else do it for you – Proxies
    10.2 Web Vulnerabilities
    10.2.1 Scripting Languages
    10.2.2 Top Ten Most Critical Web Application Vulnerabilities
    10.2.3 Security Guidelines for Building Secure Web Applications
    10.3 HTML Basics – A brief introduction
    10.3.1 Reading HTML
    10.3.2 Viewing HTML at its Source
    10.3.3 Links
    10.3.4 Proxy methods for Web Application Manipulation
    10.4 Protecting your server
    10.4.1 Firewall
    10.4.2 Intrusion Detection System (IDS)
    10.5 Secure Communications
    10.5.1 Privacy and Confidentiality
    10.5.2 Knowing if you are communicating securely
    10.6 Methods of Verification
    10.6.1 OSSTMM
    10.6.2 OWASP

    Lesson 11: Passwords
    11.0 Introduction
    11.1 Types of Passwords
    11.1.1 Strings of Characters
    11.1.2 Strings of Characters plus a token
    11.1.3 Biometric Passwords
    11.2 History of Passwords
    11.3 Build a Strong Password
    11.4 Password Encryption
    11.5 Password Cracking (Password Recovery)
    11.6 Protection from Password Cracking

    Lesson 12: Legalities and Ethics
    12.1. Introduction
    12.2. Foreign crimes versus local rights
    12.3. Crimes related to the TICs
    12.4. Prevention of Crimes and Technologies of double use
    12.4.1. The global systems of monitoring: concept "COMINT"
    12.4.2. "ECHELON" System
    12.4.3. The "CARNIVORE" system
    12.5. Ethical Hacking
    12.6. The 10 most common internet frauds


    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll